Search alternatives:
making algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
models using » model using (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
making algorithm » cosine algorithm (Expand Search)
using algorithm » cosine algorithm (Expand Search)
rd algorithm » _ algorithms (Expand Search)
models using » model using (Expand Search)
complement » implement (Expand Search), complementary (Expand Search)
-
561
Could Petrol Stations Play a Key Role in Transportation Electrification? A GIS-Based Coverage Maximization of Fast EV Chargers in Urban Environment
Published 2022“…The spatial optimization problem is solved using a linear-programming relaxation based MCLP algorithm developed in Python. …”
-
562
Economic Production Lot-Sizing For An Unreliable Machine Under Imperfect Age-Based Maintenance Policy
Published 2020“…Numerical results are provided to illustrate both the use of the algorithm in the study of the optimal cost function and the latter's sensitivity to different changes in cost factors. …”
Get full text
article -
563
A Novel Deep Learning Technique for Detecting Emotional Impact in Online Education
Published 2022“…As part of this work, two deep learning models are compared according to their performance. …”
Get full text
-
564
On sensor selection in mobile devices based on energy, application accuracy, and context metrics
Published 2013“…We use this algorithm to build a sensor selection model to choose among location sensors. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
565
A novel network-based SIS framework for improved GA performance
Published 2025“…Genetic algorithms have long been used to solve complex optimization problems by mimicking natural selection processes. …”
Get full text
Get full text
Get full text
masterThesis -
566
Fragment-based computational protein structure prediction
Published 2014Get full text
Get full text
Get full text
conferenceObject -
567
Computation of conformal invariants
Published 2021“…In particular, we provide an algorithm for computing the conformal capacity of a condenser. …”
-
568
A Closed Queueing Networks Approach for an Optimal Heterogeneous Fleet Size of an Inter-Facility Bulk Material Transfer System
Published 2024“…Validation is conducted using a discrete event simulation (DES) model. Results: The proposed analytical model tested within a steel manufacturing plant’s material transfer process. …”
-
569
A combinatorial auction‐based approach for ridesharing in a student transportation system
Published 2023“…The concept of ridesharing is used and the mechanism of combinatorial auctions is incorporated within a routing-based model. …”
-
570
Optimization metaheuristic for software testing
Published 2013“…We formulate the web application testing problem as an optimization problem and use a simulated annealing (SA) metaheuristic algorithm to generate test cases as sequences of events while keeping the test suite size reasonable. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
571
Utilization of AI to Predict Shear Strength Parameters of Soil Based on Their Physical Properties
Published 2025Get full text
doctoralThesis -
572
Applications of artificial intelligence in emergency and critical care diagnostics: a systematic review and meta-analysis
Published 2024“…<h3>Introduction</h3><p dir="ltr">Artificial intelligence has come to be the highlight in almost all fields of science. It uses various models and algorithms to detect patterns and specific findings to diagnose a disease with utmost accuracy. …”
-
573
Blockchain-Based Decentralized Architecture for Software Version Control
Published 2023“…The suggested model is implemented using the Hyperledger Fabric network, and the developer and authorizer ends are built into the dotnet web application.…”
-
574
A Navigation System for Indoor/Outdoor Environments with an Unmanned Ground Vehicle (UGV)
Published 2015Get full text
doctoralThesis -
575
-
576
Generation and Detection of Sign Language Deepfakes - A Linguistic and Visual Analysis
Published 2025“…We construct a reliable deepfake dataset, evaluating its technical and visual credibility using computer vision and natural language processing models. …”
Get full text
article -
577
Degree-Based Network Anonymization
Published 2020“…In this thesis, we study a new multi- objective parameterized anonymization approach that generalizes the known degree anonymization problem and attempts at improving it as a more realistic model for data security/privacy. Our model suggests a convenient privacy level for each net- work based on the standard deviation of its degrees. …”
Get full text
Get full text
Get full text
masterThesis -
578
A simple approach for testing web service based applications
Published 2005“…Test cases are executed automatically using a test execution algorithm and a test framework is also presented. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
579
A new minimum curvator multi-step method for unconstrained optimization
Published 1998“…In this paper, we carry on with a similar idea and define a rational model with a free parameter. Our derivation of the new algorithm is based on determining some value of the parameter that minimizes the curvature in some chosen metric. …”
Get full text
Get full text
Get full text
conferenceObject -
580
Process Mining over Unordered Event Streams
Published 2020“…Using directly-follows graphs as a basic model for many process mining tasks, we provide two approaches to handle such unorderedness, either through buffering or speculative processing. …”
Get full text
Get full text
Get full text